ZyXEL Communications ZyWALL 2 Series Network Card User Manual


 
ZyWALL 2 Series User’s Guide
Index Q-5
N
Nailed-up Connection ....................................26-4
Nailed-Up Connection ..........................23-7, 26-5
NAT .... 3-4, 3-9, 5-1, 8-5, 8-6, 23-10, 26-8, 30-16
Application........................................................... 8-3
Applying NAT in the SMT Menus .................... 28-1
Configuring........................................................ 28-3
Definitions ........................................................... 8-1
Examples............................................................ 28-9
How NAT Works................................................. 8-2
Mapping Types .................................................... 8-3
NAT Unfriendly Application Programs........... 28-15
Ordering Rules................................................... 28-6
What NAT does................................................... 8-1
NAT Traversal .............................18-1, 18-2, 18-3
NetBIOS commands ...................................... 10-7
Network Address Translation ........................ 25-2
Network Address Translation (NAT)......1-5, 28-1
Network Management......................................8-6
Network Topology With RADIUS Server
Example .......................................................E-2
NNTP............................................................... 8-6
Notice................................................................. iii
O
Offline............................................................ 22-4
One Minute High ......................................... 11-23
One Minute Low.......................................... 11-23
One to One..............................................See NAT
One-Minute High......................................... 11-21
Online Registration............................................. v
Outgoing Protocol Filters............................... 24-6
Outside............................................................. 8-1
P
Packet Filtering .....................................1-3, 10-12
Packet Filtering Firewalls .............................. 10-1
Packing List Card.......................................... xxvii
PAP.......................................................23-6, 26-5
Password 4-5, 21-2, 21-6, 31-1. See My Password
Period(hr).............................................. 23-7, 26-5
Ping.............................................................. 32-11
Ping of Death................................................. 10-4
Point-to-Point Tunneling Protocol.....3-6, 8-6. See
PPTP. See PPTP
POP3..............................................8-6, 10-3, 10-4
Port Configuration ....................................... 11-13
Port Forwarding............................................... 1-5
PPP ................................................................ 23-8
PPPoE.......................................1-4, 3-2, 3-4, 25-4
PPPoE Encapsulation25-1, 25-4, 25-5, 26-1, 26-3,
26-5, 26-10
PPTP......................... 3-2, 3-4, 3-6, 8-6, 25-3, H-1
Client ........................................................ 25-3, 25-4
Configuring a Client ................................. 25-3, 25-4
PPTP Encapsulation................1-4, 3-6, 25-3, 26-6
Private.................................9-4, 23-10, 26-8, 27-2
Private IP Address .................................... 3-8, 6-2
Protocol Filters............................................... 24-6
Incoming.............................................................24-6
Outgoing.............................................................24-6
Protocol/Port......................................... 19-7, 19-9
Q
Quick Start Guide............................................ 2-1
R
RADIUS .......................................................... 7-7
Shared Secret Key.................................................7-8
RADIUS Message Types................................. 7-7
Related Documentation..................................xxvii
Rem IP Address..............................................23-9
Rem Node Name..........................23-6, 23-8, 26-2
Remote Management..................................... 35-1
Remote Management and NAT ..................... 17-2
Remote Management Limitations......... 17-2, 35-3
Remote Node................................................. 26-1
Profile (Traffic Redirect Field).........................26-11
Remote Node Filter............................. 23-12, 26-9
Repairs.................................................................v